network/README.md

3.5 KiB

network.tjo.cloud

Handling networking between nodes and between virtual machines.

Architecture

WAN interface either represents an actual public interface (on Hetzner) or an interface in home LAN that has port-forwarded ports to it from home router.

LAN interface is an ordinary lan network.

ingress.tjo.cloud has port-forwarded all public ports to it (22, 25, 80, 443, 587 etc.). No other VM is accessible from the internet.

network.tjo.cloud establishes Tailscale VPN connection between other network.tjo.cloud VMs. Using subnet routing it makes it possible that each VM can connect to all other VMs on any Proxmox host.

Subnets

We are using 10.0.0.0/16 range for IPv4 as well as fd74:6a6f:0::/48 for IPv6.

Designations

Host IPv4 IPv6
reserved 10.0.0.0/20 fd74:6a6f:0:0000::/52
batuu 10.0.16.0/20 fd74:6a6f:0:1000::/52
jakku 10.0.32.0/20 fd74:6a6f:0:2000::/52
nevaroo 10.0.48.0/20 fd74:6a6f:0:3000::/52
10.0.64.0/20 fd74:6a6f:0:4000::/52
10.0.80.0/20 fd74:6a6f:0:5000::/52
10.0.96.0/20 fd74:6a6f:0:6000::/52
10.0.112.0/20 fd74:6a6f:0:7000::/52
10.0.128.0/20 fd74:6a6f:0:8000::/52
10.0.144.0/20 fd74:6a6f:0:9000::/52
10.0.160.0/20 fd74:6a6f:0:a000::/52
10.0.176.0/20 fd74:6a6f:0:b000::/52
10.0.192.0/20 fd74:6a6f:0:c000::/52
10.0.208.0/20 fd74:6a6f:0:d000::/52
10.0.224.0/20 fd74:6a6f:0:e000::/52
10.0.240.0/20 fd74:6a6f:0:f000::/52

Each subnet gives us 4096 IP addresses per host.

Per host designations

Use IPv4 IPv6
Virtual Machines 10.0.(y+0).0/22 fd74:6a6f:0:y000::/54
Kubernetes 10.0.(y+4).0/22 fd74:6a6f:0:y400::/54
10.0.(y+8).0/22 fd74:6a6f:0:y800::/54
10.0.(y+12).0/22 fd74:6a6f:0:yc00::/54

Each section gives us 1024 IP addresses.

Setting up new Host

1. Add new device to terraform.tfvars.

2. Manually configure vmbr0 and use import to import it.

3. Deploy terraform.

4. Set Password (see bitwarden)

5. Setup Tailscale.

Ref: https://github.com/adyanth/openwrt-tailscale-enabler

opkg update
opkg install ca-bundle kmod-tun iptables-nft kmod-ipt-conntrack kmod-ipt-conntrack-extra kmod-ipt-conntrack-label kmod-ipt-nat kmod-nft-nat
/etc/init.d/tailscale start
/etc/init.d/tailscale enable

# Batuu
tailscale up --accept-routes --advertise-routes=10.0.16.0/20,fd74:6a6f:0:1000::/52 --accept-dns=false --ssh
# Jakku
tailscale up --accept-routes --advertise-routes=10.0.32.0/20,fd74:6a6f:0:2000::/52 --accept-dns=false --ssh
# Nevaroo
tailscale up --accept-routes --advertise-routes=10.0.48.0/20,fd74:6a6f:0:3000::/52 --accept-dns=false --ssh

6. Configure.

Once tailscale is up and manually configured (see the config files for guide). We can use automated way of maintaining config.

just deploy-config

TODO

Use gitops for tailscale ACL.

Current version is an snapshot in time, more as an example then actual version used.

IPv6 Connectivity.

As we assign private ipv6 addresses, we would have to ise ipv6 nat to translate those to real ipv6 addresses.